


default search action
ACSAC 2025: Honolulu, HI, USA - Workshops
- Annual Computer Security Applications Conference, ACSAC 2025 - Workshops, Honolulu, HI, USA, December 8-9, 2025. IEEE 2025, ISBN 979-8-3315-4536-9

- Stacy A. Willson, Qian Chen:

CYPHER: Adaptive Cyber-Physical Fuzzing for ICS Security. 15-27 - Devon A. Kelly, Christiana Chamon:

Adapting Noise-Driven PUF and AI for Secure WBG ICS: A Proof-of-Concept Study. 28-38 - Wei Wang, Mitsuharu Tai, Shota Fujii, Hiroki Yamazaki, Eriko Ando:

Robust Vulnerability Estimation in Industrial Firmware via Incomplete Knowledge Graph Similarity. 39-53 - Kotoe Goya, Kano Hayashi, Ryu Kuki, Takayuki Sasaki, Katsunari Yoshioka:

Multimodal LLM-Based Identification and Fingerprinting of Internet-Exposed IoT Devices via WebUI Analysis. 54-65 - Zachary Neal, Curtis R. Taylor:

Towards Autonomous Edge-based Machine Learning and Anomaly Detection for Manufacturing. 66-75 - Jad Zarzour

, Matthew Jablonski:
Under Pressure: Security Analysis and Process Impacts of a Commercial Smart Air Compressor. 76-86 - Nathan Harrison, Dylan Stancil, Marshall Nelson, Samuel Mulder:

Triaging Firmware Updates for Critical Systems to Defend Against Software Supply Chain Threats. 87-98 - Max Taylor, Arthur Amorim, Lance Joneckis:

Securing Modbus-Based Industrial Control Systems with Refined Multiparty Session Types. 99-109 - William Yurcik, Rhonda O'Kane, Stephen C. North, O. Sami Saydjari, Fábio Robero de Miranda, Rudolfo da Silva Avelino, Rohan Pluta, Gregory Pluta:

Continuous Monitoring of Cybersecurity in U.S. Rural Hospitals. 110-121 - J. Malakai Bailey, William Yurcik, O. Sami Saydjari, Rodolfo da Silva Avelino, João Luisi Vieira, Pedro Umbelino, Gregory Pluta:

SoK: Hospital Medical Devices as Industrial Control Systems (ICS) - Exposure and Vulnerability. 122-133 - Rodolfo da Silva Avelino, Elise Bolda, Guenevere Qian Chen, Diane Dolezel, Jon Mark Hirshon, Joseph Kane, Sarah Klein, C. Scott Kruse, Bruce Leff, David M. Levine, Michael Maniaci, Monique K. Mansoura, Patricia McGaffigan, John McHugh, Fábio Roberto de Miranda, Subhas Mukhopadhyay, Jay Pandit, Gregory Pluta, Martin Pumera, S. Raj Rajagopalan, Esa M. Rantanen, Richard Rothman, Rami Saydjari, O. Sami Saydjari, Malcolm Schongalla, John Schumacher, Naomi Schwartz, Keval K. Sonigara, Natalie Sullivan, Eugene Y. Vasserman, Nalini Venkatasubramanian, Thad Wilkins, Christopher Worsham, William Yurcik:

SoK: Hospital at Home Model of Care - Toward Appropriate Use Cases and Other Challenges. 134-156 - Bruce Leff, David M. Levine, Clemens Scott Kruse, William Yurcik:

Position Paper: Hospital-at-Home is not Telehealth. 157-158 - William Yurcik, Andreas Schick:

Change Healthcare - Perspective and Lessons from the Nationwide Pharmacy Supply Chain Failure. 159-168 - Jan Pennekamp

, Johannes Lohmöller, Niels Pressel
, Sandra Geisler, Felix M. Mottaghy, Klaus Wehrle:
PatDiscover: Privacy-Preserving Discoverability of Patients. 169-184 - Josiah Dykstra, Shannon Lantzy, Eugene Y. Vasserman:

A Moonshot for Trustworthy Medical Software Updates Using Automated Insulin Delivery Systems as a Proving Ground. 185-198 - Sayantani B. Littlefield, Roy H. Campbell:

Adversarial use of protein language models for modeling escape. 199-202 - Marcus H. Sachs:

The Conficker Worm - A Persistent Hospital Device Malware. 203-206 - Subrahmanya Chandra Bhamidipati, Mauro Lemus Alarcon, Tanner Kuchar, Judah Robbins Bernal, Prasad Calyam:

FedSecRPM: Federated Learning-Based Analytics for Sensor-Based Remote Patient Monitoring. 207-211 - Dimitra Papatsaroucha, Cristina Regueiro

, Marisa Escalante, Maurizio Martignano, Velislava Hillman, Evangelos K. Markakis:
Secure and Privacy-Preserving Secondary Data Use: A Framework for Cross-Domain Computation in the Encrypted Domain. 212-221 - Josiah Dykstra, William Yurcik:

Applying Public Health Systematic Approaches to Cybersecurity: The Economics of Collective Defense. 222-229 - Hui Zhuang, Yan Long, Duyeong Kim, Jennifer R. Amos, Heejo Lee, Kevin Fu:

Probing Challenges and Future Research of SBOM Generation for Medical Devices. 230-235 - Logan Kostick, Michael Rushanan, Tushar M. Jois:

Compliance v. Completeness: A Case Study on SBOMs in Consideration of FDA Premarket Cybersecurity Guidance. 236-241 - Jiarou Deng, Yang Yang, Michael Rushanan:

The SBOM Transparency v. Exposure Dilemma: A Case Study on Adversarial Access to Public SBOMs in Healthcare. 242-247 - Mohimenul Karim, Tanmoy Sarkar Pias, Bimal Viswanath, Danfeng Daphne Yao:

AI/ML Trustworthiness for Medical Predictions - Experimental Results. 248-255 - Tanveer Khan, Maaz Rafiq, Antonis Michalas

:
AI on Trial: LLM-as-a-Judge for Private and Reliable Clinical Decision-Making. 256-262 - Pavan Reddy, Nithin Reddy:

Security Risks in Medical AI: Logo-Based Trojan Attacks on Deep Learning Models. 263-270 - Almog Bar-Yossef, Kartikeyan Subramanyam, Jonathon Guthrie, Alex Gao, Christian Dameff, Jeff Tully, Aaron Schulman:

CRASHCART: Truckin' in a Backup System to Revive Hospitals During Computer Outages. 271-280 - Desiree Rivers, Qian Chen:

A Game-Theoretic and AI Approach to Secure and Intelligent Hospital at Home Monitoring. 281-289 - Neha Nagaraja, Hayretdin Bahsi:

Goal-Driven Risk Assessment for LLM-Powered Systems: A Healthcare Case Study. 290-297 - Vani Seth, Ashish Pandey, Kavya Gundlapalli, Mahesh Duvvuri, Rithvik Mettu, Iris Zachary, Prasad Calyam:

EmpathAI: A Trustworthy and Secure Conversational Agent for Mental Healthcare. 298-301 - Abylay Satybaldy, Kamil Tylinski, Marco Alberto Javarone, Paolo Tasca:

Evaluating Systemic Risk in DAO Networks. 302-308 - Johnny Marinho, Eryk Schiller, Arthur Debauge

, Noria Foukia:
ZK-Disclosure: Privacy-Preserving Information Disclosure for Digital Evidence with C2PA and zk-SNARKs. 309-315 - Mohammad Moussa Madine, Yousuf Alsalami, Khaled Salah, Raja Jayaraman:

Framework for GDPR and HIPAA Compliance in Healthcare Applications using Zero-Knowledge Proofs. 316-322 - Maruf Farhan, Madhuki Rajapakshe, Rejwan Bin Sulaiman, Usman Butt:

Assure-exam: A blockchain-based assurance framework for secure and transparent Exam Paper Distribution. 323-331 - Vineeth Sai Narajala, Idan Habler, Ken Huang, Prashant Kulkarni:

Building A Secure Agentic AI Application Leveraging Google's A2A Protocol. 332-340 - Osama Al Haddad, Muhammad Ikram, Muhammad Ejaz Ahmed, Young Lee:

Prompting the Priorities: Evaluating LLMs for Organization-Specific Vulnerability Prioritization. 341-348 - Surabhi Garg, Ratul Kishore Saha, Manju Ramesh, M. A. Rajan, Dheeraj Chahal:

PrivPicket: Privacy Preserving Serverless Workflows via Optimized Dummy Node Insertion. 349-356 - Abanisenioluwa Orojo, Emmanuelli El-Mahmoud, Erika A. Leal, Pablo Rivas:

ByteFlow: A Byte-Level LLM for Deep Packet Inspection and Network Intelligence. 357-365 - Jason Landsborough, Neil C. Rowe, Thuy D. Nguyen:

Database Deception using Large Language Models. 366-373 - Noam Tarshish

, Daniel Hodisan, Asaf Shabtai:
IntelForge: Multi-Agent LLM Framework for Cyber Threat Intelligence Enrichment. 374-381 - Ehsan Aghaei, Sarthak Jain, Prashanth Arun, Arjun Sambamoorthy:

Securebert 2.0: Advanced Language Model for Cybersecurity Intelligence. 382-388 - Nguyen Linh Bao Nguyen, Alsharif Abuadbba, Kristen Moore, Tingmin Wu:

Can Current Detectors Catch Face-to-Voice Deepfake Attacks? 389-396 - Ecenaz Erdemir, Kyuhong Park, Yi Fan:

SCORE: Syntactic Code Representations for Static Script Malware Detection. 397-404 - Shivani Shukla, Himanshu Joshi:

Proof-Carrying Answers: A Systematic Protocol for Verifiable Retrieval-Augmented Generation with Cryptographic Provenance. 405-413 - Gurkan I Akalin, Ning Zhou:

Cybersecurity Threat Intelligence for Audit: LLM Scoping, Evidence Guardrails, and Materiality. 414-419 - Ruben Missotten

, Vera Rimmer, Wim Mees, Lieven Desmet
:
On the Potential of LLMs for Offensive Security: Benchmarks vs. Operational Reality. 420-427 - Jared Chandler:

Towards Automatic Triage and Taxonomy of Adversary Shell-Scripts. 428-435 - Rachida Saroui, Thomas Marchioro, Alexis Olivereau:

AgentNIRS: An LLM-Driven Agent for Network Intrusion Response. 436-442 - Md Tanvirul Alam, Dipkamal Bhusal, Salman Ahmad, Nidhi Rastogi, Peter Worth Jr.:

AthenaBench: A Dynamic Benchmark for Evaluating LLMs in Cyber Threat Intelligence. 443-450 - Ana M. Rodriguez, Jaime Acosta, Anantaa Kotal, Aritran Piplai:

AgentCyTE: Leveraging Agentic AI to Generate Cybersecurity Training & Experimentation Scenarios. 451-458 - Adiba Mahmud, Yasmeen Rawajfih, Ross Arnold:

Trust-Calibrated Multi-Stage Large Language Model Pipeline for Vulnerability Assessment in DevSecOps Workflows. 459-466 - Raymond Lee, Yunpeng Zhang:

Performance-Efficiency Trade-offs in Anomaly Detection Architectures for Zero-Day IoT Attack Detection: A Systematic Benchmark on CICIoT2023. 467-472 - Jayesh Guntupalli, Kentaro Watanabe:

Trust-Adaptive Agentic Retrieval Framework for LLM-Based Cyber Threat Intelligence. 473-479 - Kevin Kurian, Ethan Holland, Sean Oesch:

Attacks & Defenses Against LLM Fingerprinting. 480-490 - Prajna Bhandary, Charles Nicholas, Robert J. Joyce, Bojing Li:

Ransomware in Active Directory: A Dataset and Analysis of Early-Stage Behavior. 491-500 - Alexander Wolosewicz, Vinod Yegneswaran, Ashish Gehani, Nik Sultana:

User Study of a Network Debugger on FABRIC. 501-509 - Shashie Dilhara Batan Arachchige, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Dinusha Vatsalan, Dali Kaafar:

CTIGuardian: A Few-Shot Framework for Mitigating Privacy Leakage in Fine-Tuned LLMs. 510-522 - Saurabh Deochake, Ryan Murphy, Jeremiah Gearheart:

A Multi-Cloud Framework for Zero Trust Workload Authentication. 523-530 - Alexander J. Gaidis, Jamie Gabbay, Joao Moreira, Vasileios P. Kemerlis:

NOPoutNG: Improving the Effectiveness of Hardware-assisted Control-flow Integrity via Dynamic Landing Pad Elision. 531-545 - Christian Werling, Tahmid Zahin, Jean-Pierre Seifert:

Not Discrete Enough: On the Inherent Insecurity of dTPMs for Measured Boot. 546-550 - Frédéric Majorczyk, Barbara Pilastre, Fanny Dijoud:

A New Hope for DARPA OpTC. 551-561 - Kaleb Bacztub, Dylan Christensen, Arun Ravindran, Meera Sridhar:

Autopwn: Automatic Code-Reuse Exploit Generation Framework with Agentic AI. 562-568 - Ashley Brown, Nilufer Tuptuk, Enrico Mariconti, Shane D. Johnson:

Systematic evaluation of security attacks to household consumer smart doorbells. 569-578 - Azza H. Ahmed, Thomas Dreibholz, Foivos Michelinakis, Tarik Cicic:

Open 5G Testbed: A Cyber Range Platform for Security Research. 579-586 - Bassel Succar, Joseph Khoury, Antonia Affinito, Elias Bou-Harb:

MudHunter: Internet-Scale DNS Cache Snooping for Cyber Threat Intelligence. 587-595

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














